Showing
1 - 8
results of
8
for search '
'
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Accession No
Control No
Find
Advanced
Reset Filters
Item Category:
Reference
Suggested Topics:
Computer security
Reset Filters
Show filters (2)
Item Category:
Reference
Suggested Topics:
Computer security
Search Results
Suggested Topics within your search.
Suggested Topics within your search.
Computer security
Computer crimes --
3
Investigation
3
Access control
1
Computers --
1
Crytography --
1
Database security
1
more ...
Database security --
1
Electronic information resources --
1
Forensic sciences
1
Identity theft --
1
Malware(Computer software)
1
Microsoft software --
1
Phishing
1
Prevention
1
Project report
1
Research
1
Security measures
1
less ...
Showing
1 - 8
results of
8
for search '
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Handbook of eID security : concepts, practical experiences, technologies Walter Fumy, Manfred Paeschke.
Published 2011
Call Number:
Loading...
Located:
Loading...
Loading...
2
Thor's Microsoft security bible : a collection of practical security techniques Timothy "Thor" Mullen ; Jeffrey W. Brown technical editor.
by
Mullen, Timothy M.
Published 2011
Call Number:
Loading...
Located:
Loading...
Loading...
3
Malware Analyst's cookbook and dvd : tools and techniques for fighting malicious code Michael Ligh, Matt Richard, Steven Adair.
by
Ligh, Michael W.
Published 2011
Call Number:
Loading...
Located:
Loading...
Loading...
4
Guide to computer forensics and investigations Bill Nelson ... [et al.].
Published 2008
Call Number:
Loading...
Located:
Loading...
Loading...
5
Unix and Linux forensic analysis DVD toolkit Chris Pogue, Cory Altheide, Todd Haverkos.
by
Pogue, Chris
Published 2008
Call Number:
Loading...
Located:
Loading...
Loading...
6
International journal of cryptology research edited by edited by Mohamad Rushdan Md. Said.
Published 2009
Call Number:
Loading...
Located:
Loading...
Loading...
7
Spam detection using machine learning based binary classifier Nor Syaidatul Amirah Abdul HamidMohamad Hisham.
by
Nor Syaidatul Amirah Abdul Hamid
Published 2019
Call Number:
Loading...
Located:
Loading...
Loading...
8
Guide to computer forensics and investigations Bill Nelson, Amelia Phillips, Christopher Steuart.
by
Nelson, Bill
Published 2010
Call Number:
Loading...
Located:
Loading...
Loading...
Search Tools:
Get RSS Feed
—
Email this Search
Back
Narrow Search
Library
Main Library
6
Badak Multimedia Sorting
1
Tembila General Collection
1
Tembila Multimedia Collection
1
Tembila Project Report
1
Collections
Book
6
Miscellaneous
1
Serials
1
Item Category
Reference
Open Shelf (30 days)
5
Close Access
1
Format
Book
6
CD-ROM
3
Computer Disc
1
Digital Video Disc
1
Project Report
1
Serials
1
Call Number
H - Social Science
3
Q - Science
3
F - General American History
1
Z - Library Science
1
Author
Altheide, Cory
1
Fumy, Walter
1
Haverkos, Todd
1
Ligh, Michael Hale
1
Ligh, Michael W.
1
Mohamad Rushdan Md. Said
1
more ...
Mullen, Timothy M.
1
Nelson, Bill
1
Nor Syaidatul Amirah Abdul Hamid
1
Paeschke, Manfred
1
Phillips, Amelia
1
Pogue, Chris
1
Steuart, Christopher
1
Universiti Sultan Zainal Abidin
1
see all ...
less ...
Language
English
7
Year of Publication
From:
To:
×
Loading...